Question 1: Who has access to what?We have all heard about the necessity of doing user access reviews. Some companies do them to meet internal or external security requirements and regulations, such as Sarbanes-Oxley, SOC 1/2, HIPAA or even ISO 2700X. But did you know...
Automate your User Access Reviews
International Cybersecurity Forum (FIC) 2023
Just a few weeks left to plan to attend the FIC (International Cybersecurity Forum) in Lille, France! Riding the coat tails of over 15 success years, FIC 2023 will continue to showcase vendors of software products in the cybersecurity as well as their partners and customers.
Join us in Lille from April 5-7 to learn more about the latest trends and innovations related to protecting your company's data and assets and avoiding breaches that could affect your worldwide reputation.
Look for Brainwave GRC's stand in the Hexatrust pavilion where we will be joined by our partner, Radiant Logic. Our experts are waiting to answer all your questions about identity analytics and identity data fabric, including automated user access reviews, asset certification, privileged access governance and compliance tools to help meet internal cybersecurity policy.
Is your European company prepared for the Digital Operational Resilience Act (DORA)?
The DORA Regulation: Europe’s New Cybersecurity Measures Over the last two years, the European Commission has been working on regulations that they refer to as the Digital Operational Resilience Act (DORA). In November 2022, this act was adopted by the European...
Are User Access Review And Access Recertification The Same Thing?
Do you know the difference between user access reviews and access recertification? They sound like they could be interchangeable, but nothing could be further from the truth. Although both are designed to protect the resources within your information systems (IS), the...
Follow The EBA/EIOPA Guidelines To Secure Logical Access Rights
Nearly two years ago, the European Banking Authority (EBA) and the European Insurance and Occupational Pensions Authority (EIOPA) defined their guidelines for risk management related to both information and communication technologies (ICT) and security for the...
How To Interpret The EBA / EIOPA Guidelines About Securing Logical Access Rights?
EBA/EIOPA: What are the security recommendations for Information and Communication Technology (ICT)? In 2019, the European Banking Authority (EBA) set out to create guidelines about managing risks linked to technology security. These guidelines were...
10 Best Practices to Optimize Your User Access Reviews
A tedious requirement for companies For any organization, the user access review is an important practice. As a critical component of your Identity and Access Management (IAM) strategy, this control mechanism ensures that your Information System (IS) users have...
Periodic or Continuous Review of Access Rights : A Comparison of Use Cases
In a previous article on user access review, we highlighted the differences between periodic and continuous access reviews and how to use each one. The conclusion was that the two approaches serve different purposes and should be seen as complementary. They do not...
Periodic or Continuous User Access Review : Two Strategies for Reviewing Access Rights
Identity is everything now. Every chief information security officer should be asking themselves questions like “do you know who you’re trusting?” and “when did you last validate?”Jay Gazlay, CISA Technical Strategist It is a fact: the notion of identity is a major...
Review of Infrastructure Access: How to do it? Why do we need it?
Infrastructure access is not always well understood, controlled or reviewed. IAM/IGA projects generally focus on application rights while neglecting infrastructure access. As a result, it is common to find that accounts and the rights assigned to them accumulate...
Automate your user access reviews
EBA / EIOPA Access Right Compliance: What Is It All About?
User access reviews in less than 30 minutes: Is it even possible?
Periodic or Continuous User Access Reviews: Two Strategies
User Access Review
User Access Review
User Access Review and Certification’s Added Value for Organizations
User Access Review with Brainwave Identity Analytics
Receive monthly news,
tips and helpful hints for managing your identities.